3. ICICS 2001:
Xian,
China
Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (Eds.):
Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001.
Lecture Notes in Computer Science 2229 Springer 2001, ISBN 3-540-42880-1 BibTeX
@proceedings{DBLP:conf/icics/2001,
editor = {Sihan Qing and
Tatsuaki Okamoto and
Jianying Zhou},
title = {Information and Communications Security, Third International
Conference, ICICS 2001, Xian, China, November 13-16, 2001},
booktitle = {ICICS},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2229},
year = {2001},
isbn = {3-540-42880-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Claus-Peter Schnorr:
Security of Blind Discrete Log Signatures against Interactive Attacks.
1-12
Electronic Edition (Springer LINK) BibTeX
- Dongxi Liu, Xiaoyong Li, Yingcai Bai:
An Intelligent Intruder Model for Security Protocol Analysis.
13-22
Electronic Edition (Springer LINK) BibTeX
- Kishan Chand Gupta, Subhamoy Maitra:
Primitive Polynomials over GF(2) - A Cryptologic Approach.
23-34
Electronic Edition (Springer LINK) BibTeX
- Bo Yang, Shixiong Zhu, Yumin Wang:
Unconditionally-Secure Oblivious Transfer.
35-41
Electronic Edition (Springer LINK) BibTeX
- Chin-Chen Chang, Iuon-Chang Lin:
Cryptanalysis of the Improved User Efficient Blind Signatures.
42-46
Electronic Edition (Springer LINK) BibTeX
- Chin-Chen Chang, Kuo-Feng Hwang:
Towards the Forgery of a Group Signature without Knowing the Group Center's Secret.
47-51
Electronic Edition (Springer LINK) BibTeX
- Xiaochen Bo, Lincheng Shen, Wensen Chang:
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain.
52-61
Electronic Edition (Springer LINK) BibTeX
- Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi:
A Cyclic Window Algorithm for ECC Defined over Extension Fields.
62-73
Electronic Edition (Springer LINK) BibTeX
- Fangguo Zhang, Futai Zhang, Yumin Wang:
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves.
74-83
Electronic Edition (Springer LINK) BibTeX
- Dingfeng Ye, Junhui Yang, Zongduo Dai, Haiwen Ou:
Attacks on Two Digital Signature Schemes Based on Error Correcting Codes.
84-89
Electronic Edition (Springer LINK) BibTeX
- Kanta Matsuura:
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce.
90-94
Electronic Edition (Springer LINK) BibTeX
- Young-Chul Shim:
A New Approach for Secure Multicast Routing in a Large Scale Network.
95-106
Electronic Edition (Springer LINK) BibTeX
- Hee-Wan Kim, Hae-Kyung Rhee, Tai M. Chung, Young Ik Eom, Ung-Mo Kim:
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems.
107-118
Electronic Edition (Springer LINK) BibTeX
- Sungbaek Cho, Zbigniew Ciechanowicz:
Dealing with Uncertainties in Risk Analysis Using Belief Functions.
119-130
Electronic Edition (Springer LINK) BibTeX
- Michael Hitchens, Vijay Varadharajan:
RBAC for XML Document Stores.
131-143
Electronic Edition (Springer LINK) BibTeX
- Xian-Mo Zhang, Josef Pieprzyk:
Cheating Immune Secret Sharing.
144-149
Electronic Edition (Springer LINK) BibTeX
- Gideon Samid:
Encryption Sticks (Randomats).
150-154
Electronic Edition (Springer LINK) BibTeX
- Zhimin Song, Sihan Qing:
Applying NCP Logic to the Analysis of SSL 3.0.
155-166
Electronic Edition (Springer LINK) BibTeX
- Ian Herwono, Ingo Liebhardt:
Performance of WTLS and Its Impact on an M-commerce Transaction.
167-171
Electronic Edition (Springer LINK) BibTeX
- Carlos Ribeiro, Andre Zuquete, Paulo Ferreira:
Enforcing Obligation with Security Monitors.
172-176
Electronic Edition (Springer LINK) BibTeX
- Peng Ning, Yiqun Lisa Yin:
Efficient Software Implementation for Finite Field Multiplication in Normal Basis.
177-188
Electronic Edition (Springer LINK) BibTeX
- Jianying Zhou, Chunfu Tan:
Playing Lottery on the Internet.
189-201
Electronic Edition (Springer LINK) BibTeX
- Feng Bao, Robert H. Deng:
Privacy Protection for Transactions of Digital Goods.
202-213
Electronic Edition (Springer LINK) BibTeX
- Jie-lü Xu, Han-liang Xu, Yan Wang, Shuwang Lü:
Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions.
214-220
Electronic Edition (Springer LINK) BibTeX
- Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Zhou:
Threshold Undeniable RSA Signature Scheme.
221-232
Electronic Edition (Springer LINK) BibTeX
- Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang:
Two Simple Batch Verifying Multiple Digital Signatures.
233-237
Electronic Edition (Springer LINK) BibTeX
- Yeping He, Sihan Qing:
Square Attack on Reduced Camellia Cipher.
238-245
Electronic Edition (Springer LINK) BibTeX
- Lin You, Yi Xian Yang, Chun Qi Zhang:
Generalization of Elliptic Curve Digital Signature Schemes.
246-250
Electronic Edition (Springer LINK) BibTeX
- Bruno Crispo, Giancarlo Ruffo:
Reasoning about Accountability within Delegation.
251-260
Electronic Edition (Springer LINK) BibTeX
- Gang Pan, Yijun Wu, Zhaohui Wu:
A Novel Data Hiding Method for Two-Color Images.
261-270
Electronic Edition (Springer LINK) BibTeX
- Chan H. Lee, Xiaotie Deng, Huafei Zhu:
An Identification Scheme Provably Secure against Reset Attack.
271-279
Electronic Edition (Springer LINK) BibTeX
- Sanna Kunnari:
Estimating the Scalability of the Internet Key Exchange.
280-291
Electronic Edition (Springer LINK) BibTeX
- Shigeta Kuninobu, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue:
An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes.
292-303
Electronic Edition (Springer LINK) BibTeX
- Baoqing Ye:
Defeating Denial-of-Service Attacks on the Internet.
304-315
Electronic Edition (Springer LINK) BibTeX
- Dianlong Zhang, Harald Lukhaub, Werner Zorn:
A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications.
316-327
Electronic Edition (Springer LINK) BibTeX
- Yongyuth Permpoontanalarp, Chaiwat Rujimethabhas:
A Unified Methodology for Verification and Synthesis of Firewall Configurations.
328-339
Electronic Edition (Springer LINK) BibTeX
- Yan Chen, Adam W. Bargteil, David Bindel, Randy H. Katz, John Kubiatowicz:
Quantifying Network Denial of Service: A Location Service Case Study.
340-351
Electronic Edition (Springer LINK) BibTeX
- Juan Manuel González Nieto, Colin Boyd, Ed Dawson:
A Public Key Cryptosystem Based on the Subgroup Membership Problem.
352-363
Electronic Edition (Springer LINK) BibTeX
- Ki-Yoong Hong, Chul Kim:
On a Network Security Model for the Secure Information Flow on Multilevel Secure Network.
364-370
Electronic Edition (Springer LINK) BibTeX
- Wenjian Luo, Xianbin Cao, Xufa Wang:
NIDS Research Based on Artificial Immunology.
371-375
Electronic Edition (Springer LINK) BibTeX
- Óscar Cánovas Reverte, Antonio F. Gómez-Skarmeta:
AMBAR Protocol: Access Management Based on Authorization Reduction.
376-380
Electronic Edition (Springer LINK) BibTeX
- Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras:
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication.
381-385
Electronic Edition (Springer LINK) BibTeX
- Yan Wang, Kian-Lee Tan:
Dispatching Mobile Agents with Secure Routes in Parallel.
386-397
Electronic Edition (Springer LINK) BibTeX
- Yu Chen, Qian Fang, Zhihui Du, Zhenchun Huang, Sanli Li:
TH-SMS: Security Management System in Advanced Computational Infrastructure.
398-407
Electronic Edition (Springer LINK) BibTeX
- Ulrich Lang, Dieter Gollmann, Rudolf Schreiner:
Cryptography and Middleware Security.
408-418
Electronic Edition (Springer LINK) BibTeX
- Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao:
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes.
419-428
Electronic Edition (Springer LINK) BibTeX
- Eric Disson, Danielle Boulanger, Gilles Dubois:
A Role-Based Model for Access Control in Database Federations.
429-440
Electronic Edition (Springer LINK) BibTeX
- Hongpei Li, Lianli Chang, Xinmei Wang:
A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls.
441-450
Electronic Edition (Springer LINK) BibTeX
- Hee-Un Park, Im-Yeong Lee:
A Digital Nominative Proxy Signature Scheme for Mobile Communication.
451-455
Electronic Edition (Springer LINK) BibTeX
- Mi Ra Yi, Tae Ho Cho:
Hierarchical Simulation Model with Animation for Large Network Security.
456-460
Electronic Edition (Springer LINK) BibTeX
- Greg Maitland, Colin Boyd:
Fair Electronic Cash Based on a Group Signature Scheme.
461-465
Electronic Edition (Springer LINK) BibTeX
- Chuan-Kun Wu, Vijay Varadharajan:
Fair Exchange of Digital Signatures with Offline Trusted Third Party.
466-470
Electronic Edition (Springer LINK) BibTeX
- Jong Sou Park, Jang-Se Lee, Hwan Kuk Kim, Jeong-Rye Jeong, Dong-Bok Yeom, Sung-Do Chi:
SECUSIM: A Tool for the Cyber-Attack Simulation.
471-475
Electronic Edition (Springer LINK) BibTeX
- Yifa Li:
A New Semantics of Authentication Logic.
476-482
Electronic Edition (Springer LINK) BibTeX
- Ji-Hwan Park, Sook Ee Jeong, Chang Soo Kim:
Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles.
483-494
Electronic Edition (Springer LINK) BibTeX
- Seenil Gram:
Redundancy, Obscurity, Self-Containment & Independence.
495-502
Electronic Edition (Springer LINK) BibTeX
Copyright © Sat May 16 23:19:54 2009
by Michael Ley (ley@uni-trier.de)